U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Computers and Crime (From Criminal and Civil Investigation Handbook, P 6-109 to 6-134, 1981, Joseph J Grau and Ben Jacobson, ed. - See NCJ-84274)

NCJ Number
84315
Author(s)
S J Hecht
Date Published
1981
Length
26 pages
Annotation
Topics considered are the nature of computer crime, the vulnerability of computer systems, computer security, existing law applicable to computer crimes, and the investigation of computer crimes and abuses.
Abstract
Computer crime or abuse is defined as any incident involving computer technology in which there is a victim who suffered or could have suffered a loss and a perpetrator who by intention made or could have made gain. Types of computer crime are indicated to involve the computer as the object of the attack, using the computer system for personal gain, using a computer to commit a crime unrelated to the computer system, and using computers to intimidate, deceive, or defraud. A profile is provided of the typical computer criminal and his/her motivations for the criminal acts. Areas in computer systems vulnerable to various types of crime are noted, and ways to counter criminal attacks on particularly vulnerable aspects of a computer system are suggested. The section on computer security considers categories of safeguards, identifying computer assets and resources, identifying threats to computer systems, solving security problems, a security checklist, and future security measures. Federal and State laws bearing upon computer crime are described, and the discussion of the investigation of computer crimes covers the hiring and training of investigators and steps in the initial investigation. A computer risk checklist is provided, along with 13 references and 7 notes.